[or-cvs] Validate log options during options_validate(). Reject unr...
Nick Mathewson
nickm at seul.org
Wed Nov 10 03:40:33 UTC 2004
Update of /home/or/cvsroot/src/or
In directory moria.mit.edu:/tmp/cvs-serv14372/src/or
Modified Files:
config.c
Log Message:
Validate log options during options_validate(). Reject unrecognized log types like "Log notice magic-twanger". Also, make sure User and Group stay the same, and do not crash when somebody tries to change PidFile to NULL.
Index: config.c
===================================================================
RCS file: /home/or/cvsroot/src/or/config.c,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -d -r1.241 -r1.242
--- config.c 10 Nov 2004 03:22:49 -0000 1.241
+++ config.c 10 Nov 2004 03:40:30 -0000 1.242
@@ -256,8 +256,9 @@
if (set_max_file_descriptors(options->MaxConn) < 0)
return -1;
+
mark_logs_temp(); /* Close current logs once new logs are open. */
- if (config_init_logs(options)<0) /* Configure the log(s) */
+ if (config_init_logs(options, 0)<0) /* Configure the log(s) */
return -1;
/* Close the temporary log we used while starting up, if it isn't already
* gone. */
@@ -275,9 +276,9 @@
/* Start backgrounding the process, if requested. */
- /* XXXX We once had a reason to separate start_daemon and finish_daemon: It
- * let us have the parent process stick around until we were sure Tor was
- * started. Should we make start_daemon get called earlier? -NM */
+ /* XXXX009 We once had a reason to separate start_daemon and finish_daemon:
+ * It let us have the parent process stick around until we were sure Tor
+ * was started. Should we make start_daemon get called earlier? -NM */
if (options->RunAsDaemon) {
start_daemon(options->DataDirectory);
}
@@ -1025,6 +1026,9 @@
options->Logs = config_line_prepend(NULL, "Log", "notice-err stdout");
}
+ if (config_init_logs(options, 1)<0) /* Validate the log(s) */
+ return -1;
+
if (server_mode(options)) {
/* confirm that our address isn't broken, so we can complain now */
uint32_t tmp;
@@ -1206,6 +1210,19 @@
return result;
}
+/** Helper: return true iff s1 and s2 are both NULL, or both non-NULL
+ * equal strings. */
+static int
+opt_streq(const char *s1, const char *s2)
+{
+ if (!s1 && !s2)
+ return 1;
+ else if (s1 && s2 && !strcmp(s1,s2))
+ return 1;
+ else
+ return 0;
+}
+
/** Check if any of the previous options have changed but aren't allowed to. */
static int
options_transition_allowed(or_options_t *old, or_options_t *new_val) {
@@ -1213,8 +1230,7 @@
if(!old)
return 0;
- if (old->PidFile &&
- (!new_val->PidFile || strcmp(old->PidFile,new_val->PidFile))) {
+ if (!opt_streq(old->PidFile, new_val->PidFile)) {
log_fn(LOG_WARN,"PidFile is not allowed to change. Failing.");
return -1;
}
@@ -1234,7 +1250,15 @@
return -1;
}
- /* XXX not allowed to change User or Group either */
+ if (!opt_streq(old->User, new_val->User)) {
+ log_fn(LOG_WARN,"During reload, changing User is not allowed. Failing.");
+ return -1;
+ }
+
+ if (!opt_streq(old->Group, new_val->Group)) {
+ log_fn(LOG_WARN,"During reload, changing User is not allowed. Failing.");
+ return -1;
+ }
return 0;
}
@@ -1539,7 +1563,7 @@
* Initialize the logs based on the configuration file.
*/
int
-config_init_logs(or_options_t *options)
+config_init_logs(or_options_t *options, int validate_only)
{
struct config_line_t *opt;
int ok;
@@ -1559,7 +1583,8 @@
ok = 0; goto cleanup;
}
if (smartlist_len(elts) < 2) { /* only loglevels were provided */
- add_stream_log(levelMin, levelMax, "<stdout>", stdout);
+ if (!validate_only)
+ add_stream_log(levelMin, levelMax, "<stdout>", stdout);
goto cleanup;
}
if (!strcasecmp(smartlist_get(elts,1), "file")) {
@@ -1567,7 +1592,8 @@
log_fn(LOG_WARN, "Bad syntax on Log option 'Log %s'", opt->value);
ok = 0; goto cleanup;
}
- add_file_log(levelMin, levelMax, smartlist_get(elts, 2));
+ if (!validate_only)
+ add_file_log(levelMin, levelMax, smartlist_get(elts, 2));
goto cleanup;
}
if (smartlist_len(elts) != 2) {
@@ -1575,24 +1601,36 @@
ok = 0; goto cleanup;
}
if (!strcasecmp(smartlist_get(elts,1), "stdout")) {
- add_stream_log(levelMin, levelMax, "<stdout>", stdout);
+ if (!validate_only)
+ add_stream_log(levelMin, levelMax, "<stdout>", stdout);
close_temp_logs();
} else if (!strcasecmp(smartlist_get(elts,1), "stderr")) {
- add_stream_log(levelMin, levelMax, "<stderr>", stderr);
+ if (!validate_only)
+ add_stream_log(levelMin, levelMax, "<stderr>", stderr);
close_temp_logs();
} else if (!strcasecmp(smartlist_get(elts,1), "syslog")) {
#ifdef HAVE_SYSLOG_H
- add_syslog_log(levelMin, levelMax);
+ if (!validate_only)
+ add_syslog_log(levelMin, levelMax);
#else
log_fn(LOG_WARN, "Syslog is not supported in this compilation.");
#endif
+ } else {
+ log_fn(LOG_WARN, "Unrecognized log type %s",
+ (const char*)smartlist_get(elts,1));
+ if (strchr(smartlist_get(elts,1), '/')) {
+ log_fn(LOG_WARN, "Did you mean to say 'Log file %s' ?",
+ (const char *)smartlist_get(elts,1));
+ }
+ ok = 0; goto cleanup;
}
cleanup:
SMARTLIST_FOREACH(elts, char*, cp, tor_free(cp));
smartlist_clear(elts);
}
smartlist_free(elts);
- close_temp_logs();
+ if (!validate_only)
+ close_temp_logs();
return ok?0:-1;
}
More information about the tor-commits
mailing list